# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a87e5ec1837046c2361b1292f30a1e954e2004a189a357dc3b0ae44d59b9a333
Pseudo Output
5e7ba03d6397dc9d572fa5901ebe2bcc201d59069f6f5d6583a06eb2606ebe09
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
287bc51822c429826c94ab5614c7218a1f2c94330b1d6475808e7c059005a900
Commitment
7622856afc2e8934ac6e61d529c345b281fc277360d8355ad6d743ae8f621a76
Range Proof
672 bytes (Bulletproof)
Memo
7c32755463f71a7bbedce96820bf594ef9652a29166d406f3ef82890e14768bed9227591400fc5ad21c5ee00fd0573cd705484c51196f9085d6eab12bb4172e4b8688881c351dd38ac0f7cc105cedf750ca51e9f76b545c29942dc56624274fbb55979644ba1974f166b0a1c651193dddc4ec9f40d29c90afa97ee548300634f (encrypted)
Stealth Address
22d6fa9a636d3c4b5edd45fb986cd47533f34e79048bd88fb38e2713df91842d
Commitment
0e77714a0c7f16bf72e767afa5c3553f839f1d06668f653f8f30266ee939211c
Range Proof
672 bytes (Bulletproof)
Memo
5b4cc67f78a636801a60b660ef11beedfba360ed819f8d62f12193fff675c1e7dbfe6dfef4256f25b8fbb3be34512ac70355594001065a9622b3a744aee0f07c3fc798f20da8c78d5e6318c35513649d3e04fbbb69457d395a6e791e13c4a2a31689752f8fafca03f110c68d3fbea306d4faadd49d5685e89baf31d804f96473 (encrypted)